Pew Internet has a new study out that shows that most of us have done something to maintain our privacy (or at least the illusion of it) on the Net. Here’s the summary from the report’s home page:

A new survey finds that most internet users would like to be anonymous online, but many think it is not possible to be completely anonymous online. Some of the key findings:

86% of internet users have taken steps online to remove or mask their digital footprintsâ??ranging from clearing cookies to encrypting their email.

55% of internet users have taken steps to avoid observation by specific people, organizations, or the government.

The representative survey of 792 internet users also finds that notable numbers of internet users say they have experienced problems because others stole their personal information or otherwise took advantage of their visibility online. Specifically:

21% of internet users have had an email or social networking account compromised or taken over by someone else without permission.

12% have been stalked or harassed online.

11% have had important personal information stolen such as their Social Security Number, credit card, or bank account information.

6% have been the victim of an online scam and lost money.

6% have had their reputation damaged because of something that happened online.

4% have been led into physical danger because of something that happened online.

You can read the whole thing online or download the pdf, for free. Thank you, Pew Internet!

As I posted a couple of weeks ago, my interest isn’t in accountability. On the contrary. Usually, we think that along the Continuum of Responsibility, putting your name to something will push you toward the Staying In Line side, while being anonymous lets you run toward the Recklessness goal post. But, it doesn’t always work that way. At a site like WhiteHouse.gov, the anonymity of bloggers reinforced the notion that the blog is a faceless voice of authority, with an adjoining door to the Office of Press Releases. I’m hoping that now that the bloggers are signing their posts, they will feel free-er to speak in their own voices, and present shades of view that are a bit more off-angle, and thus more interesting than the Official View. That’s already been true of the posts of the guest bloggers on the site. Now I hope the official bloggers will feel ok about occasionally saying “OMG!!!! I CAN’T BELIEVE I’M IN THE WHITE HOUSE!!!!!!” except maybe a little more constructively and definitely with the caps only implied.

Doc blogs about the unfairness of Craigslist becoming an adjective attached to “killer.” Yes, it’s unfair. It’s what the tabloid press does. And increasingly, that just means “the press.”

That’s the sort of catchy name that sells papers. But, as Craig points out in his blog, Craigslist does not promise anonymity. In fact, it promises that it will rat out rats. Wikipedia makes the same promise. Good. Of course, this assumes the police are not persecuting innocents as part of a totalitarian state, but I’m happy Craigslist helped the police arrest the sick fuck who otherwise probably wasn’t done murdering women allegedly.

The PR job doesn’t stop with the media, of course. Craigslist’s PR company fumbled the ball here in Boston. This Businessweek story is excellent, but the Boston Globe coverage has been miserable (here, here and here). The PR agency seems intent on keeping Craig from commenting, shunting inquiries to CEO Jim Buckmaster. Nothing against Jim, but Craig’s name is on the site. Craig has earned his reputation for honesty, bluntness, and service. Craig is known, respected, and even beloved. So, master the buck, Craig. It stops with you.

PS: The Globe ought to take a look at the “Erosphere” classified ad section of the Boston Phoenix before coming down on Craigslist.

Protection for anonymous postings is certainly not an absolute, but a high threshold that requires prima facie evidence supporting the plaintiff’s claim is critical to ensuring that a proper balance is struck between the rights of a plaintiff (whether in a defamation or copyright case) and the privacy and free speech rights of the poster. … I fear that the high threshold seems to have been abandoned here….

“Courts around the country have recognized that, although the right of free speech is not absolute, a plaintiff must show that its claims are legally and factually tenable before a court orders that the identity of an anonymous speaker be disclosed,” noted CMLP Assistant Director Sam Bayard. “Anonymous speech on blogs, online fora, and other websites leads to a vibrant exchange of information, and putting a plaintiff to its proofs before unmasking an online commenter helps to ensure constitutionally-protected speech is not chilled.”

In a case involving important First Amendment rights, the Citizen Media Law Project (“CMLP”) joined a number of media and advocacy organizations, including Gannett Co., Inc., Hearst Corporation, Illinois Press Association, Online News Association, Public Citizen, Reporters Committee for Freedom of the Press, and Tribune Company, in asking an Illinois appellate court to protect the rights of anonymous speakers online by imposing procedural safeguards before requiring that their identities be disclosed.

danah boyd, John Palfrey, and Dena Sacco, three co-authors of the recent Internet Safety Technical Task Force are giving a Berkman lunch. (Laura Debonis, chair of the technical advisory board, steps in a minute late because of the snow.) (You can hear a podcast with JP and here. You can read the report here.) [Note: I’m liveblogging, whch means I’m getting things wrong, putting in typos, missing stuff, abbreviating, paraphrasing, getting meanings backwards, etc. Posted un-proofed]

JP gives the background. The ISTTF was created in Feb. 2008 by 49 state attorneys general (not Texas) and MySpace who, in a joint statement, agreed to report on the extent of unwanted contact and content (i.e., sexual predation and porn) among young folk, initially focusing on social networking sites. Thirty organizations were involved, ncluding social networking sites, Google, Microsoft, policy groups, and companies that make technology to protect kids. There was a research advisory board (chaired by danah) to make this a data-driven process. The aim of the Task Force was to assess the actual data, and then evaluate solutions. The technical advisory board advised on solutions.

dr. danah: The task force collected research. Sexual predation has been tracked over the years. “The number of online predation pale compared to the numbers for off line sexual harm.” That doesn’t negate it, but the harm is rarely stranger-related. The studies looked at studies of sexual solicitation online and of studies of cases in which someone was arrested. Most messages are not repeated, and the most common response is that the kid’s ignore it. The repeated ones are, of course, more likely to be reported. There are very few number of cases where online solicitation leads to offline contact. (This is about all Internet activity, danah says, not just SNS (social networking site/s).) Sexual solicitation has gone down over the years. It’s primarily high school age. They primarily know that they’re meeting up with someone for sexual purposes. 70% repeat the meet. “This is not the Dateline model.” The kids know what they’re doing, although “huge power issues are at play” of course. The published material says that the online chat rooms are far more likely to be connected with these cases. The SNS are much less likely. Of the kids who received sexual solicitations (one-off or repeated), what are the factors at play? The kids who are at risk are not representative of the entire population. “They’re much more likely to be at risk off line”: more likely to have been sexually abused, to have drug and alcohol issues. The online and offline behavior are closely connected.

JP: Some people disagree very strongly with what you’ve said. Some of the AGs who commissioned think our report downplays the danger and is outdated. If you create a profile page for a 14 year old girl, the AGs say you’re bombarded with sexual solicitations immediately.

danah: The research we’ve tracked goes all the way up through the Fall of 2008. Very consistent pattern. To confirm that the pattern is continuing, I called up the researchers and asked them to check their latest data sets, but they see consistent patterns.

danah: The AGs say the arrest record data is different, but they haven’t provided that data. We are publicly begging for that data. One researcher looked at all the press releases about arrests in PA, and called up PA reporting systems for sexual harm. Even in the 2008 data for PA, almost all of the cases of arrests are for when a police officer pretends to be a youngster, in a sting. Most are chat room and IM. There were three on SNS, and all fit the pattern of an older teen meeting up and thinking she’s in a relationship. WRT stings: If you go one line as a 12 yr old and put up naked photos and ask for sex, you will be solicited. But kids aren’t doing that. They’re at SNS to talk with their friends, not to the creeps. Again, you still have to worry about the exceptions. And if a 12 yr old puts up a page to attract older men, those kids desperately need our help. But if we assume that’s typical, you miss the kids who must need our help.

JP: What are the relative risks of predation and peer-to-peer (= bullying)?

danah: Almost half of sexual solicitation comes from other minors. 30-40% come from 18-24 year olds. There’s bullying wrapped up with sexual solicitation. There are various definitions of bullying, so you get radically different numbers in the research. Regardless of the definition, far more are victims of it online than are victims of sexual solicitation. There are lots of ramifications of bullying. For an average, you should be much more concerned about peer-to-peer sexual solicitation in the schools and p2p bullying. The sexual solicitation needs to involve police, social workers, etc. Parents are the best intervention point for bullying.

danah: Content solicitation hasn’t changed much. Porn numbers are relatively consistent. The primary unwanted exposures are searching for the wrong thing and email spam; SNS don’t seem to be a primary source. Violent content is well under-researched. We’re beginning to see youth-generated problematic content; a lot more work needs to be done on this. E.g., photos of self-harm (cutting, etc.), homemade porn, etc.

JP: Laura, are there technologies we should be using?

Laura: All 40 of the techs we looked at had something to recommend them, but none were 100% accurate all of the time. There were also privacy and security issues. MySpace uses Sentinel age verification. Parents use net nanny tech with reasonable degrees of success. But our mandate was to find the tech that could be used across the board, and we couldn’t find one.

JP: The SNS told us what tech they’re currently using. So now we have a sense of who’s using what. There’s promise in what’s coming out of labs.

Dena: The Task Force made a series of recommendations, for the Internet community, for parents, and where additional researches might be best spent. Overall, our recommendation was that while the tech we reviewed is promising, the AGs should not endorse any one tech or set of techs. Such an endorsement could inhibit development in this area. Also, we need more research: more resources, more data from law enforcement. Also, ISPs, AGs, academics, educators, social services, law enforcement etc., all should continue to collaborate on this problem. Also, education is important! The report includes specific recommendations.

Dena: How do you lower the risk while keeping the Net open and anonymous?

Q: [gene] The risk is context dependent. Maybe the AGs think it’s riskier because the risks are higher for those who are at risk. The damage may be higher…
A: [dana] The Internet makes access to the social world more pervasive. It’s not clear the Net has made such a strong impact, but it makes at risk kids more visible to those who can help them…more visible to educators, law enforcement, social workers. Before the Net, a lot of parents couldn’t see their kids being bullied. Now they can see some of the ramifications of it.

Q: Do you think that’s why your research is being attacked?
A: [danah] When I interviewed teenagers about predators, they’d point to Dateline. There’s consensus on these images. “On the Death of the Public Space” makes the case that we’ve begun to fear public spaces. There are also some political issues behind this.
JP: Of all the things I’ve done as a researcher, this was the meanest. So, danah, let’s say you’re right that we have burned into our minds a higher degree of risk, maybe that’s ok. Maybe we should have a higher degree of caution. What’s wrong with the fears being overblown if it keeps our kids away from harm?
danah: Looking kids away from risks does them a disservice. We need to educate them so they can make wise decisions. We also rupture trust: Kids are being hemmed in but don’t see the problems they’re parents are referring to. Also, this has been about a hierarchical dissemination, rather than parents reaching out to kids whose parents are not looking out for them. We need to work collectively, not just assume hierarchically delivered services.

[Eszter Hargittai] I too get frustrated by those who say the data must have changed. Things generally don’t change that quickly.
JP: The primary pushback from AGs is that they’ve put pup profiles and have been immediately solicited.
Eszter: How American is this? The fear? The response? How might other countries be dealing with these issues?
danah: We focused on the US but we did look out at the world. We also showed the research to researchers outside of US. The UK has similar dynamics. Europe does not. In part this is because kids’ mobility is different. The further you get out from the US and UK, the more meeting people online is acceptable and not tainted with risk. It’s assumed to be how you meed people with shared interests. And it doesn’t raise the numbers of sexual harm.
JP: There are studies in Canada and the UK and a EU Commission process. There’s great consistency across these reports.

Q: [sarah] I work with groups dealing with domestic violence. Research in that field shows that the vast majority of abuse comes from people in the home. Perhaps people object to your report because they find it more comfortable to think that abuse comes from people outside the family? Also, what contradiction between profiles and arrest records were you referring to?
A: [danah] The arrest record for online-related sex crimes shows the abuser and the victim. One scary thing we’ve seen: Family members targeting others over the Net so other family members won’t know it.

[scott macleod, via net] What do kids say they want for protection?
A: [danah] The most common thing you hear from them is what they hear from parents and teachers. So they’ll you the way to be safe is not to put up identifying info and to report other kids. Doesn’t mean they do it. Classic statement: “Just don’t be stupid.” WRT to bullying they don’t always identify it as bullying.
[dena] There’s an org that has kids present to kids.

Q: A lawyer’s question: To protect rights, isn’t it the parent’s job, not the government’s, to take care of what their kids do and see online.
A: [jp] The Communications Decency Act only affects content. In Born Digital, we say Section 230 should be amended. It provides immunity to intermediaries. It’s very important in the defamation space. It’s been interpreted as extending far beyond its intention so that “Julie Doe” was unable to sue MySpace after she was hurt by a sexual predator. MySpace probably wasn’t liable in that case, but they should have had to face the music. This is a very unpopular position. [I’ll say!] You could also mandate tech, such as age verification, and the fact that the report doesn’t say that might account for some of the resistance. Changing 230 would give sites an incentive to compete on safety.

Q: Privately funded report? And could you recommend a standard any hypothetical tech would have to meet?
JP: I wasn’t paid a penny to write this. This was on top of my job. My only incentive was to protect my children. WRT standards: I think the next best step would be for the companies to talk about standards, about data sharing. There should be ap ublished best practices for protecting kids in different environments.

In Brazil the public defense people ask the ISPs to comply with best practices. Parallel, we just changed the law to put a lot of responsibility on the ISPs, e.g., data retention. Are there emerging best practices?
A: [dena] People have said that the report says there’s no problem and we oughtn’t do anything. That’s backwards. The report says what the risks are and suggests what we ought to do. [Tags: berkmanisttfsexual_predationchild_safetybullyinganonymity ]

According to this excellent blog, Kentucky is considering a bill banning anonymous online speech. (The blog is the class blog for “The Web Difference” course I’m co-teaching, with John Palfrey, at Harvard Law.)

* * *

And speaking of courses, I find it heartwarming that today I’m able to open our session on whether the Web has changed marketing by using some slides on “what is marketing” from John Hauser’s Spring 2005 course on marketing at MIT, which is available as open courseware. Gotta love the open courseware.